Best Practices To Mitigate The Network Attacks

 Mitigation of Network Threats:

In this section we will discuss best practices we can use to mitigate various network threats. How do we better protect ourselves against various outsiders or even insiders that might be trying to compromise our network resources.
 
Signature Management:
we should use devices like an intrusion prevention system sensor or an intrusion detection system sensor, those sensors rely on signatures, patterns that allow them to recognize well known attacks. We should make sure to keep our signature database whether it's IDS or IPS or virus signatures, any sort of signatures that can help us identify malicious traffic.
Device Hardening:
we should not use the default configurations or default passwords. We should disable any unnecessary services that might be running on a device. If a server doesn't need to have web services running, maybe we disable web services on that server.

Change of Native VLAN:
Configure the trunk’s untagged VLAN to a non default value, to prevent unconfigured switch ports from automatically belonging to the native VLAN.

Defined the Privileged user accounts:
Define accounts for administrative users and add administrative privileges to those accounts rather than sharing a single ‘admin’ account.

File Integrity Monitoring:
There should be a method to monitor or detect any change in a critical system or files.

Role Separation/Least Privileges:
Assigns different sets of permissions to different categories of users, in an attempt to prevent conflicts of interest.

Honeypot:
Configure a host or network that does not have confidential information and keep this insecure to understand the techniques of the attacker to your organization.

Network Segmentation:
Logically subdivide the networks into different segments using VLAN or DMZ in an attempt to prevent specific users from accessing specific network resources.

Penetration Testing:
Perform authorized attacks to evaluate the level of security of the organization.

Comments

Popular posts from this blog

Analyzing Spear Phishing Email

Cyber Threat Intel

Authentication Services